breakerspace / weaponizing-residual-censorship
your censor is my censor: weaponizing residual censorship to perform availability attacks
☆21Updated 3 years ago
Related projects: ⓘ
- censors pose a threat to the entire Internet☆131Updated 3 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆44Updated 3 years ago
- Clone network interface from one host as a tap interface on another host☆53Updated 3 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆60Updated last year
- Network Tools☆32Updated 9 months ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆149Updated 11 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆101Updated last week
- ICMP and DNS tunneling via IPv4 and IPv6☆194Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆42Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bytesqatting, and homoglyph domain attacks and brand impersonation☆35Updated 9 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆68Updated 2 months ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆13Updated 7 months ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆83Updated 6 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆75Updated last year
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆91Updated 2 months ago
- OpenWRT Suricata package☆43Updated 6 years ago
- Build a Mirai botnet from the source code.☆38Updated 5 years ago
- Dns amplification attack☆14Updated 5 years ago
- collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated last year
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated this week
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆95Updated last month
- ☆14Updated 3 years ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆64Updated last week
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆12Updated 6 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆180Updated 4 months ago
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆56Updated last year
- A native and unofficial implementation of p0f3 in Python with extra analysis features: It's p0f3+!☆25Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆20Updated last year
- D4 core software (server and sample sensor client)☆43Updated 8 months ago